CyberGlossary

Defense & Operations

Vulnerability Scanning

Also known as: Vuln scanning, Automated vulnerability scan

Definition

Automated process that probes systems, applications, or containers against known vulnerability signatures to produce a list of potential weaknesses.

Vulnerability scanning uses tools such as Nessus, Qualys, Tenable, OpenVAS, or cloud-native scanners to fingerprint assets and compare detected software, configurations, and exposures against vulnerability databases (CVE/NVD) and benchmarks (CIS, DISA STIG). Scans can be authenticated (with credentials, providing deeper accuracy) or unauthenticated, agent-based or network-based, and may run continuously or on a schedule. Results require triage to remove false positives, enrich with exploitability and asset context, and feed remediation. Scanning is one input to a broader vulnerability management program; alone it does not prove exploitability.

Examples

  • An authenticated weekly scan of Linux servers that detects missing kernel patches.
  • A container image scan in the CI pipeline blocking builds with critical CVEs.

Related terms